Logo Dr. Soumyo Maity
  • Dark Theme
    Light Theme Dark Theme System Theme
Logo Inverted Logo
  • Tags
  • access
  • administrators
  • analysis
  • and
  • API
  • Application
  • architects
  • architecture
  • (ASM)
  • assessment
  • (AST)
  • Attack
  • attacks
  • auditing
  • automation
  • awareness
  • beginners
  • best
  • box
  • Browser
  • career
  • center
  • Cloud
  • Code
  • coding
  • compliance
  • composition
  • Container
  • Cross-site
  • culture
  • cycle
  • (DAST)
  • Data
  • Database
  • Denial-of-service
  • developers
  • development
  • DevSecOps_longer
  • (DLP)
  • (DoS)
  • Dynamic
  • education
  • Embedded
  • Encryption
  • engineering
  • engineers
  • Enterprise
  • escalation
  • event
  • everyone
  • executives
  • exploit
  • Extensible
  • firewall
  • for
  • Fuzz
  • governance
  • Grey
  • (IAM)
  • Identity
  • In-memory
  • incident
  • information
  • InfoSec
  • injection
  • Input
  • Integration
  • intelligence
  • interface
  • IT
  • language
  • life
  • loss
  • Malware
  • management
  • managers
  • markup
  • metrics
  • Mobile
  • modeling
  • monitoring
  • Network
  • Object-oriented
  • (OOP)
  • Open
  • Operating
  • operations
  • (OWASP)
  • Password
  • Phishing
  • Physical
  • policy
  • practices
  • prevention
  • Privilege
  • professionals
  • programming
  • project
  • protection
  • Ransomware
  • (RASP)
  • response
  • review
  • Risk
  • Runtime
  • (SAST)
  • (SCA)
  • scripting
  • (SDLC)
  • Secure
  • security
  • security_longer
  • self-protection
  • Side-channel
  • (SIEM)
  • (SOC)
  • software
  • Static
  • surface
  • system
  • systems
  • testers
  • testing
  • Threat
  • training
  • trust
  • validation
  • vulnerability
  • (WAF)
  • (WAST)
  • weaknesses
  • web
  • Wireless
  • (XML)
  • (XSS)
  • Zero
  • Zero-day
Hero Image
Vulnerability Assessment

Vulnerability assessment is the process of identifying and assessing vulnerabilities in an organization’s information systems and assets. It is an important part of any organization’s information security program. Vulnerability assessments can be conducted manually or using automated tools. Manual vulnerability assessments are typically more thorough, but they can be time-consuming and expensive. Automated vulnerability assessments are less thorough, but they can be conducted quickly and easily. The results of a vulnerability assessment can be used to prioritize security efforts, to develop mitigation strategies, and to improve the overall security posture of an organization.

October 1, 2022 Read
Hero Image
Vulnerability Management

Vulnerability management is the process of identifying, assessing, and mitigating vulnerabilities in an organization’s information systems and assets. It is an ongoing process that is essential for protecting an organization from attack. Vulnerability management typically involves the following steps: Identifying vulnerabilities: The first step is to identify vulnerabilities in an organization’s information systems and assets. This can be done through vulnerability scanning, penetration testing, and threat intelligence gathering. Assessing vulnerabilities: Once vulnerabilities have been identified, they need to be assessed to determine their severity and impact.

September 7, 2022 Read
Hero Image
Application Security Vulnerability Management

Application security vulnerability management (ASVM) is the process of identifying, assessing, and mitigating security vulnerabilities in applications. It is an essential part of any organization’s overall security program. There are a number of benefits to implementing ASVM, including: Reduced risk of data breaches: By identifying and mitigating security vulnerabilities, organizations can reduce the risk of data breaches. Improved compliance: Organizations that implement ASVM can help to comply with security regulations, such as PCI DSS and HIPAA.

October 26, 2019 Read
Navigation
  • About
  • Recent Posts
  • Skills
  • Experiences
  • Education
  • Publications
Contact me:
  • soumyamaity@gmail.com
  • soumyamaity
  • Soumyo Maity, PhD
  • +91*********

Toha Theme Logo Toha
© Soumya Maity, 2023
Powered by Hugo Logo